- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
If you’re getting an “unable to verify AWS account” error when trying to add your AWS account to Cloudcraft, it may be because your organization has attached a service control policy to the account. This prevents Cloudcraft’s servers from validating the created IAM role.
To resolve this error, you have the following options:
us-east-1
regionYou can ask your IT team to temporarily enable access to the us-east-1
region in their policies. This is the region Cloudcraft uses to verify the IAM role. After you add the account, you can then disable the region again, and Cloudcraft will be limited to only scanning components in the regions that aren’t blocked.
To help make a stronger case about opening an exception in the policy, you can offer your organization’s administrators the option of attaching a minimal IAM policy to the role, limiting what Cloudcraft can and can’t read from the AWS account added to the application. For more information, see Create a minimal IAM policy to use with Cloudcraft.
As an alternative to using the web interface, you can use Cloudcraft’s API to add your account and specify which region the account should be checked from. For more information, see Add AWS accounts via the Cloudcraft API.